Tsai, 2021 - Google Patents
The application of blockchain of custody in criminal investigation processTsai, 2021
View PDF- Document ID
- 4162362239088992229
- Author
- Tsai F
- Publication year
- Publication venue
- Procedia Computer Science
External Links
Snippet
With the advancing technologies become tools for illicit activities and avoid detection, digital forensics is necessary for law enforcement in modern criminal investigations. In order to maintain the integrity and authenticity of the evidence, a chain of custody is essential for the …
- 238000009114 investigational therapy 0 title abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30011—Document retrieval systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Konashevych | General concept of real estate tokenization on blockchain: The right to choose | |
Yue et al. | Big data model of security sharing based on blockchain | |
Erri Pradeep et al. | Leveraging blockchain technology in a BIM workflow: A literature review | |
Tsai | The application of blockchain of custody in criminal investigation process | |
Nishi et al. | [Retracted] Electronic Healthcare Data Record Security Using Blockchain and Smart Contract | |
Rouhani et al. | Physical access control management system based on permissioned blockchain | |
Chen et al. | Study and implementation on the application of blockchain in electronic evidence generation | |
Kassab et al. | Investigating quality requirements for blockchain-based healthcare systems | |
Yadav et al. | KYC optimization using blockchain smart contract technology | |
US11314729B2 (en) | Multi-candidate data structure for transaction validation | |
Konashevych | ‘GoLand Registry’Case Study: Blockchain/DLT Adoption in Land Administration in Afghanistan | |
Ardina et al. | Design of a blockchain-based employee attendance system | |
Demichev et al. | Business process engineering for data storing and processing in a collaborative distributed environment based on provenance metadata, smart contracts and blockchain technology | |
Sater | Blockchain and the european union's general data protection regulation: A chance to harmonize international data flows | |
Malik et al. | Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things | |
Ncube et al. | Land registry using a distributed ledger | |
Varela-Vaca et al. | Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case | |
Xu et al. | CL‐BC: A Secure Data Storage Model for Social Networks | |
Rathore et al. | An evolutionary algorithmic framework cloud based evidence collection architecture | |
Rajasekar et al. | Blackchain-based Identity Management Systems in Digital Forensics | |
Hilary | Blockchain: Security and Confidentiality. | |
Cha et al. | A security risk management framework for permissioned blockchain applications | |
Hariharasudan et al. | Single Identity System for Identification papers based on Blockchain | |
Bundela et al. | Security concerns in cloud and blockchain solutions | |
Javed et al. | Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems |